To Request Scanning Services

Types of Scanning Services

Vulnerability Scanning

Vulnerability scanning is a computer program designed to assess computers, computer systems, networks or applications to determine if a computer is vulnerable to certain over-the-network attack methods. This can be carried out on both wired and wireless networks.

Web Application Security Scanning

Websites are most vulnerable to attacks from hackers. Websites that contain applications like carts, forms, login pages, and dynamic content are prone to attacks. Web applications are generally deployed on port 80, which has to remain open and hence provides no protection. Some of the examples of web vulnerabilities are:

SQL injection

Cross Site Scripting (XSS)

Remote Code execution

Format String Vulnerabilities

Username Enumeration

Scanning FAQs

Can I scan on my own?

The network at UH belongs to the University and only authorized persons may do scans. Anyone caught doing unauthorized scans is subject to University sanctions or legal actions. If you have to ask if you can do a scan then you're most likely not authorized.